-
Notifications
You must be signed in to change notification settings - Fork 1
Commit
- Loading branch information
There are no files selected for viewing
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,82 @@ | ||
### Identity Mapper | ||
|
||
The schema for the object to be returned by the identity mapper script. | ||
|
||
<Fields rows={ | ||
[{ | ||
field: "role", | ||
description: "Mission control role. See [RBAC](/reference/rbac)", | ||
scheme: "`admin` | `viewer` | `editor`", | ||
}, | ||
{ | ||
field: "teams", | ||
description: "List of name or id of the teams the OIDC identity will be put into", | ||
Check warning on line 13 in mission-control/docs/installation/_properties_identity_mapper.mdx GitHub Actions / vale[vale] mission-control/docs/installation/_properties_identity_mapper.mdx#L13
Raw output
|
||
scheme: "`[]string`", | ||
}] | ||
} /> | ||
|
||
|
||
#### Kratos Identity | ||
|
||
<Fields rows={ | ||
[ | ||
{ | ||
field: "created_at", | ||
Check failure on line 24 in mission-control/docs/installation/_properties_identity_mapper.mdx GitHub Actions / vale[vale] mission-control/docs/installation/_properties_identity_mapper.mdx#L24
Raw output
|
||
description: "Timestamp for when the identity was created", | ||
scheme: "`timestamp`", | ||
}, | ||
{ | ||
field: "id", | ||
description: "Unique identifier for the identity", | ||
scheme: "string", | ||
}, | ||
{ | ||
field: "metadata_public", | ||
Check failure on line 34 in mission-control/docs/installation/_properties_identity_mapper.mdx GitHub Actions / vale[vale] mission-control/docs/installation/_properties_identity_mapper.mdx#L34
Raw output
|
||
description: "Public metadata for the identity", | ||
scheme: "`map[string]any`", | ||
}, | ||
{ | ||
field: "state", | ||
description: "Current state of the identity", | ||
scheme: "`active` | `inactive`", | ||
}, | ||
{ | ||
field: "traits", | ||
description: "Identity's traits.", | ||
scheme: "[`Trait`](#kratos-identity-trait)", | ||
}, | ||
{ | ||
field: "updated_at", | ||
Check failure on line 49 in mission-control/docs/installation/_properties_identity_mapper.mdx GitHub Actions / vale[vale] mission-control/docs/installation/_properties_identity_mapper.mdx#L49
Raw output
|
||
description: "Timestamp for when the identity was last updated", | ||
scheme: "`timestamp`", | ||
}, | ||
] | ||
} /> | ||
|
||
#### Kratos Identity Trait | ||
|
||
<Fields rows={ | ||
[ | ||
{ | ||
field: "name.first", | ||
description: "First name", | ||
scheme: "string", | ||
}, | ||
{ | ||
field: "name.last", | ||
description: "Last name", | ||
scheme: "string", | ||
}, | ||
{ | ||
field: "email", | ||
description: "Email address", | ||
scheme: "string", | ||
required: true, | ||
}, | ||
{ | ||
field: "groups", | ||
description: "List of groups the identity belongs to", | ||
scheme: "`[]string`", | ||
} | ||
] | ||
} /> |
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,59 +1,59 @@ | ||
--- | ||
title: Mission Control | ||
--- | ||
import Properties from '@site/docs/installation/_properties.mdx' | ||
|
||
|
||
import Properties from '@site/docs/installation/_properties.mdx' | ||
|
||
export const toc = [ | ||
Check failure on line 7 in mission-control/docs/reference/helm/mission-control.mdx GitHub Actions / vale[vale] mission-control/docs/reference/helm/mission-control.mdx#L7
Raw output
Check failure on line 7 in mission-control/docs/reference/helm/mission-control.mdx GitHub Actions / vale[vale] mission-control/docs/reference/helm/mission-control.mdx#L7
Raw output
|
||
{ | ||
value: "Mission Control", | ||
id: "mission-control", | ||
level: 2, | ||
}, | ||
{ | ||
value: "Canary Checker", | ||
id: "canary-checker", | ||
level: 3, | ||
}, | ||
{ | ||
value: "Config DB", | ||
id: "config-db", | ||
level: 3, | ||
}, | ||
{ | ||
value: "Authentication", | ||
id: "authentication", | ||
level: 2, | ||
}, | ||
|
||
{ | ||
value: "Ingress", | ||
id: "ingress", | ||
level:2, | ||
}, | ||
{ | ||
value: "Database", | ||
id: "database", | ||
level: 2, | ||
}, | ||
{ | ||
value: "Custom postgres.conf", | ||
id: "updating-postgresconf-settings", | ||
level: 3, | ||
}, | ||
{ | ||
value: "Using an External DB", | ||
id: "using-an-external-database", | ||
level: 3, | ||
}, | ||
|
||
|
||
|
||
|
||
|
||
{ | ||
value: 'Mission Control', | ||
id: 'mission-control', | ||
level: 2, | ||
}, | ||
{ | ||
value: 'Canary Checker', | ||
id: 'canary-checker', | ||
level: 3, | ||
}, | ||
{ | ||
value: 'Config DB', | ||
id: 'config-db', | ||
level: 3, | ||
}, | ||
{ | ||
value: 'Authentication', | ||
id: 'authentication', | ||
level: 2, | ||
}, | ||
|
||
{ | ||
value: 'Ingress', | ||
id: 'ingress', | ||
level: 2, | ||
}, | ||
{ | ||
value: 'Database', | ||
id: 'database', | ||
level: 2, | ||
}, | ||
{ | ||
value: 'Custom postgres.conf', | ||
id: 'updating-postgresconf-settings', | ||
level: 3, | ||
}, | ||
{ | ||
value: 'Using an External DB', | ||
id: 'using-an-external-database', | ||
level: 3, | ||
}, | ||
{ | ||
value: 'Identity Mapper', | ||
id: 'identity-mapper', | ||
level: 2, | ||
}, | ||
] | ||
|
||
|
||
## Mission Control | ||
|
||
<Properties/> |
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,9 +1,5 @@ | ||
--- | ||
title: Reference | ||
slug: /reference | ||
sidebar_position: 0 | ||
--- | ||
|
||
{/* | ||
import DocCardList from '@theme/DocCardList'; | ||
<DocCardList /> */} |
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,18 @@ | ||
--- | ||
title: RBAC | ||
sidebar_position: 10 | ||
--- | ||
|
||
Mission control heavily uses RBAC to manage access control and permissions within the system. In our system, we have defined the following roles: | ||
Check warning on line 6 in mission-control/docs/reference/rbac.mdx GitHub Actions / vale[vale] mission-control/docs/reference/rbac.mdx#L6
Raw output
|
||
|
||
## Admin | ||
|
||
The admin role has full access to all features and functionalities of the system. | ||
|
||
## Editor | ||
|
||
The editor role has various read-write privileges apart from few highly privileged actions like user management, agent management, connection management, etc ... | ||
|
||
## Viewer | ||
|
||
The viewer role has read-only access to the system |